当前位置:主页 > 科技论文 > 路桥论文 >

基于区块链的车载命名数据网络安全机制研究

发布时间:2020-12-03 08:13
  命名数据网络NDN通信模型中的“命名内容”和“内容自证实”机制使得它更适合于高速移动的车载自组织网络,现有的车载命名数据网络(V-NDN)方案能够解决网络遭受的某些传统攻击问题,但同时也引入了一些新的安全问题。网络中任何恶意车辆节点通过观察兴趣分组和数据分组中的内容名称来生成虚假的内容,并缓存于中间节点以备将来请求或发送虚假内容以误导其他车辆。另外,洪泛网络中不存在内容的请求会导致兴趣洪泛攻击,如与交通安全相关的虚假信息会造成交通事故等。因此,解决网络中可能存在的恶意攻击对车联网安全至关重要。针对以上问题,本论文基于区块链中信息具有不可篡改的特点,将网络中与交通安全相关的通信作为“交易”信息并将其保存于区块链中,这样,可以对信息进行验证和审计,提出了一种解决上述安全问题的BV-NDN方案。本论文主要研究工作如下:1.为了建立网络,设计了基于椭圆曲线密码系统ECC的认证机制以及网络中实体参与的许可区块链,其中区块链管理器验证要加入网络中的节点的身份,并将其身份信息和其他密码学材料保存在区块链存储库下的防篡改存储中。2.为了验证网络中的车辆通信信息,设计了用于交通数据共享的通信协议,且只有... 

【文章来源】:兰州理工大学甘肃省

【文章页数】:84 页

【学位级别】:硕士

【文章目录】:
中文摘要
Abstract
1.Introduction
    1.1 Research Background and Significance
    1.2 Research status at home and abroad
        1.2.1 VANET security and privacy Standardization
        1.2.2 Security and Privacy Requirements in VANET
        1.2.3 VANET Security and Privacy problem
        1.2.4 Security and Privacy Challenges for NDN-based Vehicular Network (V-NDN)
        1.2.5 Existing Security and Privacy related solution in NDN
    1.3 Major study Motivation and Contributions
    1.4 Thesis Outline
2.Related Theory and basic principles
    2.1 An overview of Vehicular ad-hoc network(VANET)
    2.2 Named Data Networking Overview
        2.2.1 Background
        2.2.2 System architecture and Communication model
        2.2.3 NDN routing and forwarding
    2.3 VANET via NDN implementation(V-NDN)
        2.3.1 Overview
        2.3.2 Implementation Design
        2.3.3 NDN Advantages over VANET Networking
        2.3.4 Vulnerabilities on Security and Privacy in V-NDN
    2.4 Blockchain technology
        2.4.1 Background
        2.4.2 Blockchain Core Technology
        2.4.3 Structure of a block
        2.4.4 Classification of Blockchain systems
        2.4.5 Practical Byzantine Fault Tolerate Algorithm(PBFT)
        2.4.6 Blockchains Efforts in VANET
    2.5 Brief Summary
3.V-NDN Blockchain System Design and Implementation
    3.1 Introduction
    3.2 Encryption and verification algorithms:Elliptic Curve Cryptosystem
    3.3 System Model
        3.3.1 Network Model
        3.3.2 Threaten Model
        3.3.3 Security Requirements:Design Goals
    3.4 V-NDN Blockchain design
        3.4.1 Network Set Up and Initialization Phase
        3.4.2 Communication model for vehicles in BV-NDN
        3.4.3 Requesting an Interest packet
        3.4.4 Revocation of Malicious Vehicles
    3.5 Brief Summary
4.V-NDN Blockchain System Performance Evaluation
    4.1 Security and Theoretical Analysis
    4.2 Simulation set up
        4.2.1 Simulation configuration
        4.2.2 simulation parameters
    4.3 Performance Metrics
    4.4 Performance Evaluation Results
    4.5 Brief Summary
Conclusions and Future Works
References
Acknowledgement



本文编号:2896232

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/daoluqiaoliang/2896232.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户0c54b***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com